Search results for "Security"
showing 10 items of 1693 documents
Mobility and Spatio-Temporal Exposure Control
2013
Modern risk assessment methods cover many issues and encompass both risk analysis and corresponding prevention/mitigation measures.However, there is still room for improvement and one aspect that may benefit from more work is “exposure control”.The “exposure” an asset experiences plays an important part in the risks facing the asset.Amongst the aspects that all too regularly get exposed is user identities and user location information,and in a context with mobile subscriber and mobility in the service hosting (VM migration/mobility) the problems associated with lost identity/location privacy becomes urgent.In this paper we look at “exposure control” as a way for analyzing and protecting use…
Risk Analysis of a Fuel Storage Terminal Using HAZOP and FTA
2017
[EN] The size and complexity of industrial chemical plants, together with the nature of the products handled, means that an analysis and control of the risks involved is required. This paper presents a methodology for risk analysis in chemical and allied industries that is based on a combination of HAZard and OPerability analysis (HAZOP) and a quantitative analysis of the most relevant risks through the development of fault trees, fault tree analysis (FTA). Results from FTA allow prioritizing the preventive and corrective measures to minimize the probability of failure. An analysis of a case study is performed; it consists in the terminal for unloading chemical and petroleum products, and t…
Pensar el riesgo. En diálogo con Luhmann
2010
RESUMEN La sociología del riesgo es una de las derivaciones más importantes de la teoría de sistemas de Luhmann. Riesgo no es una realidad sino un esquema de observación característico de nuestro tiempo. El concepto de riesgo es siempre parte de una dicotomía y Luhmann analiza dos posibilidades: riesgo-seguridad, riesgo-peligro. Esta última distinción es la que permite una gestión del riesgo capaz de asignar responsabilidades mediante el manejo de la noción de imputación. Hay una tendencia muy significativa a transformar peligros en riesgos. Los sistemas generan y trabajan con riesgos, que distribuyen y transforman. Aquí se analizan algunos de los riesgos del sistema jurídico. Los riesgos …
The Law of Service Robots
2014
Il settore della robotica attiene alla progettazione e costruzione di un complesso variegato ed eterogeneo di macchine, quali robot, soldati e chirurghi, sistemi automatizzati di trasporto aereo, terrestre e marittimo, applicazioni industriali nell’ambito manifatturiero o nella agricoltura, robotica di servizio e altro ancora. Si tratta di un settore per eccellenza interdisciplinare la varietà di ambiti e applicazioni del quale fa sì che si discuta ancora sulla definizione di robot e su alcune sue proprietà: l’autonomia, l’adattatività o i gradi di interattività. Su queste basi, il problema, attualmente, non è tanto quello di determinare se e in che modo i robot ”agiscano”; la questione ver…
Security rights and insolvency law in the Roman legal system
2017
This chapter contains an analysis in depth of the Roman law system on security rights in rem (Spain, Italy, France).
A root cause analysis method for preventing erratic behavior in software development: PEBA
2019
Measures taken to prevent faults from being introduced or going undetected can secure development of highly reliable software systems. One such measure is analyzing root causes of recurring faults and preventing them from appearing again. Previous methods developed for this purpose have been reactive in nature and relied heavily on fault reporting mechanisms of ogranizations. Additionally, previous efforts lack a defined mechanism for innovating corrective actions. In this study, we strive to complement the existing methods by introducing a proactive and qualitative method that does not rely on fault data. During the course of the research, in addition to an extensive literature search, an …
Algorithmic Complexity Vulnerability Analysis of a Stateful Firewall
2016
Algorithmic complexity vulnerabilities are an opportunity for an ad-versary to conduct a sophisticated kind of attack i.e. on network infrastructure services. Such attacks take advantage of worst case time or space complexity of algorithms implemented on devices in their software. In this paper we address potential risks introduced by such algorithmic behavior in computer networks in particular on a stateful firewall. First we introduce the idea and theoretical background for the attack. We then describe in full detail a successfully con-ducted attack which takes advantage of the worst case computational complexi-ty of O(n2) of a hash table data structure used to store active sessions. The …
Early Warning Systems for Food Security in West Africa: Evolution, Achievements and Challenges
2010
In West Africa, early warning systems (EWSs) for food security have been widely recognized to have contributed, in the last 20 years, to an improved ability to deal with famine emergencies. Nevertheless, despite the advancements in understanding of the environmental and socio-economic dynamics and despite the improved technologies, tackling food security remains a difficult task for decision makers as demonstrated by local food crises in many countries of the region. African Monsoon Multidisciplinary Analysis, while improving the understanding of the monsoon system, allowed us to better orient research challenges to provide EWS with improved products, effectively meeting the needs of end-us…
Empirical Study on Cyber Range Capabilities, Interactions and Learning Features
2021
Emerging technologies and the globalization require constant investment in people and their performance in actual and virtual environments. New technologies such as autonomous systems, machine learning and artificial intelligence (AI) radically re-contextualize the human dimension of the organization. Technological developments are changing the ways people experience the physical and the virtual environments. Strategic changes have revealed new critical vulnerabilities such as social media-based disinformation campaigning with impact on the human aspects at state, societal, organizational and individual levels. Scenarios of gathering information, committing fraud or getting access to critic…
Tietoturvan toteutus SD-WAN -operaattoripalveluissa
2017
Tutkielmassa selvitettiin vaihtoehtoja, joiden avulla palomuuraukseen liittyvä tekninen tietoturva voidaan toteuttaa uusissa SD-WAN -pohjaisissa verkottamisratkaisuissa ja niihin liittyvissä hybridiverkoissa operaattorin näkökulmasta. Palomuuraukseen liittyvää ratkaisua tulisi voida hyödyntää operaattorin asiakasverkoissa ja sen tulee skaalautua asiakkaiden käyttämien palveluiden mukaisesti. Tutkielmassa analysoitiin, kuinka SDN- ja NFV-teknologioita voidaan hyödyntää palomuurauksen toteutuksessa ja kannattaako palomuuraus toteuttaa SDN-pohjaisessa verkossa keskitetysti vai hajautetusti. Lisäksi pohdittiin, kuinka verkon hallinta voidaan toteuttaa keskitetysti, jotta jokaista verkon laitett…